DocumentCode :
2326461
Title :
Fast S-Box Substitution Instructions and Their Hardware Implementation for Accelerating Symmetric Cryptographic Processing
Author :
Duan Cheng-hua ; Jiang Jun ; Wang Xing-Ming ; Xu Wen-Yuan
Author_Institution :
Sch. of Inf. Sci. & Eng., Grad. Univ. of Chinese Acad. of Sci., Beijing
fYear :
2009
fDate :
23-24 May 2009
Firstpage :
1
Lastpage :
4
Abstract :
In popular symmetric ciphers, S-box substitution is the core operation that dominates executions of cryptographic algorithms. In this paper, a method of application-specific instruction-set extension is used for accelerating the key operation in symmetric cryptography. Two instructions for S-box access are designed by constructing a novel flexible on-chip parallel substitution box unit that consists of multiple lookup tables and a post-processing module. The box unit is integrated into the 32-bit configurable Leon2 processor. Configuration of Leon2 is presented. Implementing this extended processor core on Virtex-II XC2V3000 FPGA shows that the parallel substitution box unit uses very small amount of hardware resources (1 KB of memory and some logic circuits). Evaluation of the performance of S-box access instructions for AES is conducted according to Amdahl Law, and the results show that overall speedup of greater than 2 can be achieved. Benefits for other symmetric ciphers using S-box substitution as their core operation are accordingly expected.
Keywords :
cryptography; field programmable gate arrays; instruction sets; microprocessor chips; table lookup; 32-bit configurable Leon2 processor; Virtex-II XC2V3000 FPGA; accelerating symmetric cryptographic processing; application-specific instruction set extension; cryptographic algorithm; fast S-box substitution instruction; hardware implementation; lookup tables; on-chip parallel substitution box unit; symmetric ciphers; symmetric cryptography; Acceleration; Computer aided instruction; Costs; Cryptography; Embedded system; Field programmable gate arrays; Hardware; Logic circuits; Software algorithms; Table lookup;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
E-Business and Information System Security, 2009. EBISS '09. International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-2909-7
Electronic_ISBN :
978-1-4244-2910-3
Type :
conf
DOI :
10.1109/EBISS.2009.5137980
Filename :
5137980
Link To Document :
بازگشت